· Research attempted or successful efforts to compromise systems’ security and determine next steps, including potential escalations.
· Develop and implement automation of security processes and procedures where possible and translate security policy into effective controls.
· Respond to security incidents, conduct threat intelligence and analysis, and use data analytics to drive security decisions.
· Conduct and support red/purple team operations or improve security posture.
· Maintain hardware, software, network firewalls, and encryption protocols, and they administer security policies to control access to systems.